The wait is over. $LOCK is live!
LogoLogo
Back to Gridlock
  • 👋Welcome
  • ⚔️Guardians
    • ⚔️All About Guardians
      • Why can't a Guardian steal my crypto?
      • Can a hacker combine the devices in my network?
      • Why does Gridlock have 2 parts of my key?
      • Why not use a seed phrase for recovery?
      • Partner Guardians
  • 💎Gridlock Crypto Wallet
    • Getting Started
    • Guardians
      • How they work
      • Social Recovery
        • Device Migration
        • Guardian Replacement
        • Password Reset
    • Transactions
      • Purchasing
      • Sending and Receiving
    • NFTs
      • Gridlock Foundation Coin
        • How to claim the Gridlock Foundation Coin
    • Gridlock vs Cold Storage
  • 👑Gridlock Pro
    • Going Beyond Secure
    • Features
      • Advanced Monitoring
      • More Guardians
      • Access to Partner Guardians
      • Priority Support
  • 💫The tech
    • Design Principles
      • Simple
      • Safe
      • Non-custodial
    • Multi-Party Computation
    • Distributed Key Generation
    • Threshold Signatures
  • LOCK
    • Learn about LOCK
    • Earn some LOCK
    • General LOCK FAQ
  • 🧞‍♂️FAQs
    • General FAQs
    • Transaction FAQs
  • 🖥️Developer Docs
    • SDK / CLI Documentation
    • Gridlock Demo Setup
Powered by GitBook
On this page

Was this helpful?

  1. The tech

Threshold Signatures

Our use of Threshold Signature Scheme (TSS) technology allows you full wallet access without requiring all five Guardian devices to be active. Key splitting ensures your private key remains hidden and unreachable, with TSS enabling you to use your wallet without all Guardian devices online.

To access your wallet, only 3 out of 5 guardian devices need to be online - typically you and Gridlock. If Gridlock becomes unavailable, your guardians are in place to ensure fund recovery remains possible.

Last updated 1 year ago

Was this helpful?

💫